{"id":772,"date":"2026-03-23T12:59:26","date_gmt":"2026-03-23T12:59:26","guid":{"rendered":"https:\/\/cloudfirst.in\/insight\/?p=772"},"modified":"2026-03-25T04:32:59","modified_gmt":"2026-03-25T04:32:59","slug":"10-google-workspace-mistakes-indian-enterprises-keep-making-and-how-to-fix-them","status":"publish","type":"post","link":"https:\/\/cloudfirst.in\/insight\/10-google-workspace-mistakes-indian-enterprises-keep-making-and-how-to-fix-them\/","title":{"rendered":"10 Google Workspace Mistakes Indian Enterprises Keep Making (And How to Fix Them)"},"content":{"rendered":"\n<p><a href=\"https:\/\/cloudfirst.in\/g-suite.php\" data-type=\"link\" data-id=\"https:\/\/cloudfirst.in\/g-suite.php\">Google Workspace<\/a> is deployed. Users are onboarded. Licences are paid. And somewhere in the Admin Console, a set of default settings is quietly creating security exposure, compliance risk, or wasted spend \u2014 because no one went back to change them after go-live.<\/p>\n\n\n\n<p>These are not exotic misconfigurations. They are the same mistakes that appear across Indian enterprises of every size \u2014 from 50-person startups to 5,000-person corporates. What makes them persistent is that they are invisible until they are not: a data incident, an audit, a compliance review, or a departing employee who still has access to the company Drive.<\/p>\n\n\n\n<p>This guide covers the ten most consequential Google Workspace mistakes in the Indian enterprise context \u2014 with specific, actionable fixes for each.<\/p>\n\n\n\n<p><strong>Note for IT admins: <\/strong>Most fixes require Super Admin or delegated admin access to the Admin Console at admin.google.com. Test policy changes in a sub-Organisational Unit before rolling out domain-wide.<\/p>\n\n\n\n<p>Security Misconfigurations<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Mistake #1: Not Enforcing 2-Step Verification for All Users<\/h3>\n\n\n\n<p><strong>Risk: <\/strong><em>High \u2014 Security, DPDP Act<\/em><\/p>\n\n\n\n<p>2-Step Verification (2SV) is not enabled by default in Google Workspace \u2014 it must be enforced by the admin. In most Indian enterprise deployments, it is switched on but not enforced: users are prompted to set it up but can skip it indefinitely. The result is that 20\u201340% of users in organisations without IT follow-through never complete enrolment.<\/p>\n\n\n\n<p>For admin accounts, the risk is compounded. A compromised Super Admin account gives an attacker full control over the entire Workspace domain \u2014 all users, all data, all settings. Phishing attacks targeting Indian enterprise email accounts have increased sharply since 2024, and credential theft remains the most common initial access vector.<\/p>\n\n\n\n<p>The DPDP Act requires Data Fiduciaries to implement &#8220;reasonable security safeguards.&#8221; Failing to enforce MFA on accounts with access to personal data is increasingly difficult to defend as &#8220;reasonable&#8221; in any regulatory or legal context.<\/p>\n\n\n\n<p><strong>\ud83c\uddee\ud83c\uddf3&nbsp; India Context: <\/strong><em>CERT-In&#8217;s advisory explicitly recommends MFA as a baseline control. Under the DPDP Act, a breach attributed to absent MFA could constitute failure to implement reasonable security safeguards \u2014 with penalties up to \u20b9250 crore per contravention.<\/em><\/p>\n\n\n\n<p><strong>How to fix:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Admin Console \u2192 Security \u2192 Authentication \u2192 2-Step Verification. Set enforcement to &#8220;On&#8221; \u2014 not &#8220;Allow users to turn on.&#8221;<\/li>\n\n\n\n<li>For Super Admins, enforce hardware security keys (Google Titan or FIDO2-compliant) \u2014 not just SMS or authenticator apps.<\/li>\n\n\n\n<li>Set a grace period of 1\u20137 days for new users to enrol before enforcement applies.<\/li>\n\n\n\n<li>Use the Security Dashboard to identify unenrolled users and run a targeted remediation campaign before full enforcement.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Mistake #2: Leaving Drive External Sharing Set to &#8220;Anyone with the Link&#8221;<\/h3>\n\n\n\n<p><strong>Risk: <\/strong><em>High \u2014 Security, DPDP Act<\/em><\/p>\n\n\n\n<p>Google Drive&#8217;s default sharing behaviour allows users to generate public links \u2014 accessible to anyone on the internet without authentication. In most Indian enterprise deployments this is never restricted, which means any employee can inadvertently expose sensitive files, customer data, financial records, or internal documents publicly.<\/p>\n\n\n\n<p>The problem accumulates silently. Files shared publicly three years ago remain public until someone explicitly changes them. There is no automatic expiry, no alert, and no default audit trail surfacing public links to admins. In the Indian context, this routinely includes customer PII \u2014 names, phone numbers, Aadhaar references, financial records \u2014 that falls squarely under the DPDP Act&#8217;s definition of personal data.<\/p>\n\n\n\n<p><strong>How to fix:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Admin Console \u2192 Apps \u2192 Google Workspace \u2192 Drive and Docs \u2192 Sharing settings. Set external sharing to Off or &#8220;Allowed with warning&#8221; as the default.<\/li>\n\n\n\n<li>Disable &#8220;Anyone with the link&#8221; at the domain level \u2014 restrict to &#8220;Specific people&#8221; or &#8220;People in your organisation.&#8221;<\/li>\n\n\n\n<li>Run a Drive audit via Reports \u2192 Audit \u2192 Drive to identify publicly shared files. Prioritise Shared Drives and files owned by departed employees.<\/li>\n\n\n\n<li>Set up DLP rules (Business Plus \/ Enterprise) to flag or block sharing of files containing Aadhaar numbers, PAN, or other sensitive data patterns.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Mistake #3: Unrestricted Third-Party App Access via OAuth<\/h3>\n\n\n\n<p><strong>Risk: <\/strong><em>High \u2014 Security<\/em><\/p>\n\n\n\n<p>Google Workspace allows users to grant third-party applications access to their account data via OAuth \u2014 signing in with Google, authorising apps to read Gmail, access Drive, or manage Calendar. In most enterprise deployments, users grant this access freely without admin awareness or approval.<\/p>\n\n\n\n<p>The result is OAuth permission sprawl: hundreds of apps across the organisation \u2014 productivity tools, browser extensions, AI assistants \u2014 each holding persistent access to corporate data, many never revoked when employees change roles or leave.<\/p>\n\n\n\n<p>By 2026, consent phishing \u2014 where attackers use legitimate-looking OAuth apps to gain persistent access \u2014 is one of the dominant initial access vectors in SaaS environments. An OAuth token granted to a malicious app survives password resets and 2SV, because it is independent of the user&#8217;s credential.<\/p>\n\n\n\n<p><strong>How to fix:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Admin Console \u2192 Security \u2192 API Controls \u2192 Manage Third-Party App Access. Review all connected apps and their permission scopes.<\/li>\n\n\n\n<li>Set &#8220;Default access to Google data&#8221; to &#8220;Don&#8217;t allow users to access any third-party apps&#8221; and maintain an approved allowlist instead.<\/li>\n\n\n\n<li>Audit existing OAuth grants \u2014 prioritise apps with Gmail (read\/modify), Drive (read\/write), and Admin SDK scopes. These carry the highest risk.<\/li>\n\n\n\n<li>Block access to uncategorised apps and establish an IT approval process for new OAuth app requests.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">User Lifecycle and Admin Errors<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Mistake #4: No Offboarding Process \u2014 Departed Employees Retain Access<\/h3>\n\n\n\n<p><strong>Risk: <\/strong><em>High \u2014 Security, DPDP Act<\/em><\/p>\n\n\n\n<p>Employee offboarding is one of the most consistently neglected processes in Indian enterprise Google Workspace deployments. When an employee leaves, their account often remains active \u2014 either because IT is not notified promptly, or because the account is suspended but not properly transferred. Drive files owned by departed users become inaccessible orphans that no one in the organisation can find or manage.<\/p>\n\n\n\n<p><strong>\ud83c\uddee\ud83c\uddf3&nbsp; India Context: <\/strong><em>With India&#8217;s IT sector attrition rate at approximately 25%, a 500-person company is offboarding roughly 125 employees per year. Each one is a potential data exposure event without an automated, verified offboarding process. Under the DPDP Act, an ex-employee accessing personal data post-departure is a breach attributable to the organisation.<\/em><\/p>\n\n\n\n<p><strong>How to fix:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Document an offboarding checklist: suspend account \u2192 transfer Drive ownership to manager \u2192 revoke OAuth tokens \u2192 remove from groups \u2192 archive mailbox via Vault \u2192 delete account after retention period.<\/li>\n\n\n\n<li>Admin Console \u2192 Users \u2192 [User] \u2192 Transfer data. Move Drive files and Calendar events to the reporting manager at the point of suspension.<\/li>\n\n\n\n<li>Set automated alerts for accounts suspended for more than 30 days without transfer or deletion.<\/li>\n\n\n\n<li>Audit Shared Drives for files owned by suspended or deleted users \u2014 a common and overlooked data governance risk.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Mistake #5: Using the Super Admin Account for Day-to-Day Administration<\/h3>\n\n\n\n<p><strong>Risk: <\/strong><em>High \u2014 Security<\/em><\/p>\n\n\n\n<p>In most small and mid-market Indian enterprise deployments, a single Super Admin account handles all administrative tasks \u2014 creating users, managing groups, changing policies, billing. This account is often the domain owner&#8217;s personal Google account, sometimes sharing a password with other services.<\/p>\n\n\n\n<p>Super Admin is the highest privilege level in Google Workspace. A compromised Super Admin account allows an attacker to create new admin accounts, modify security settings, export all user data, disable 2SV for all users, and take over the entire organisation&#8217;s cloud identity.<\/p>\n\n\n\n<p><strong>How to fix:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Create at least two Super Admin accounts dedicated solely to admin tasks \u2014 never used for day-to-day email or Workspace. Store credentials in a PAM vault.<\/li>\n\n\n\n<li>Assign delegated admin roles with least-privilege access for day-to-day IT tasks: User Management Admin, Groups Admin, Help Desk Admin. Reserve Super Admin for domain-level changes only.<\/li>\n\n\n\n<li>Enforce hardware security keys specifically for Super Admin accounts \u2014 do not allow SMS or authenticator app 2SV for these accounts.<\/li>\n\n\n\n<li>Enable Admin Console audit logs and set alerts for all Super Admin actions \u2014 logins, policy changes, and user creation.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Mistake #6: Ignoring Google Vault \u2014 or Using It Without a Retention Policy<\/h3>\n\n\n\n<p><strong>Risk: <\/strong><em>Medium \u2014 Compliance, DPDP Act<\/em><\/p>\n\n\n\n<p>Google Vault is included in Business Plus and Enterprise plans, providing eDiscovery, archiving, and legal hold capabilities for Gmail, Drive, Chat, and Meet recordings. In most Indian enterprise deployments, it is either unconfigured or enabled with default settings \u2014 no custom retention policies, no legal holds, no meaningful audit trail.<\/p>\n\n\n\n<p>This creates two simultaneous problems: data that should be retained for regulatory or legal purposes gets deleted automatically, and data that should be deleted under the DPDP Act&#8217;s data minimisation requirements accumulates indefinitely.<\/p>\n\n\n\n<p><strong>How to fix:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Define retention requirements for your industry before configuring Vault. BFSI organisations have RBI-mandated periods; listed companies have SEBI requirements. Map these to Vault retention rules.<\/li>\n\n\n\n<li>Create retention rules for Gmail, Drive, and Chat that align with your compliance obligations \u2014 not Google&#8217;s defaults.<\/li>\n\n\n\n<li>Use the Legal Hold feature for any ongoing litigation, regulatory inquiry, or HR investigation. Legal holds override retention rules.<\/li>\n\n\n\n<li>Under the DPDP Act, configure deletion rules for data no longer needed for its original purpose \u2014 and document the policy for audit evidence.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Compliance and Data Governance<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Mistake #7: Treating Google Workspace as Outside the DPDP Act Compliance Perimeter<\/h3>\n\n\n\n<p><strong>Risk: <\/strong><em>High \u2014 DPDP Act, Compliance<\/em><\/p>\n\n\n\n<p>Many Indian enterprises have begun DPDP Act compliance programmes \u2014 but their Google Workspace environment is frequently excluded, treated as a productivity tool rather than a data processing system. This is a significant gap.<\/p>\n\n\n\n<p>Google Workspace processes substantial volumes of personal data: employee records in Gmail and Contacts, customer communications in Drive, HR data in Sheets, meeting recordings, and AI-processed content via Gemini. Under the DPDP Act, the organisation is the Data Fiduciary for all of it. Google is a Data Processor \u2014 and the Data Processing Amendment must be formally accepted as part of compliance.<\/p>\n\n\n\n<p><strong>\ud83c\uddee\ud83c\uddf3&nbsp; India Context: <\/strong><em>Google&#8217;s Data Processing Amendment is available in Admin Console \u2192 Account \u2192 Legal \u2192 Data Processing Amendment. It must be explicitly accepted by a Super Admin to formalise the Data Processor relationship under DPDP. Most Indian enterprises have not done this. Enterprise plans also offer Data Regions \u2014 controlling where data is stored at rest \u2014 relevant for organisations with data residency obligations.<\/em><\/p>\n\n\n\n<p><strong>How to fix:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Accept Google&#8217;s Data Processing Amendment in the Admin Console \u2014 the foundational step that formalises Google&#8217;s role as Data Processor under DPDP.<\/li>\n\n\n\n<li>Include Google Workspace in your DPDP data mapping exercise. Identify which personal data flows through Workspace and the legal basis for processing it.<\/li>\n\n\n\n<li>If on Enterprise plan, configure Data Regions to control where data is stored at rest.<\/li>\n\n\n\n<li>Configure DLP rules to detect and prevent sharing of Aadhaar numbers, PAN, phone numbers, and financial account details outside the organisation.<\/li>\n\n\n\n<li>Ensure your privacy notice covers processing via Google Workspace tools, including Gemini AI features.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Mistake #8: Deploying Gemini AI Without a Governance Policy<\/h3>\n\n\n\n<p><strong>Risk: <\/strong><em>High \u2014 DPDP Act, Security<\/em><\/p>\n\n\n\n<p>Gemini AI features are now available across Business and Enterprise plans, and most Indian enterprises have simply enabled them across the board without considering the data governance implications. Gemini in Gmail can read and summarise emails. Gemini in Drive can analyse files. Gemini in Meet can transcribe meetings. All of this involves personal data being processed by AI.<\/p>\n\n\n\n<p>Under the DPDP Act, this processing must have a legal basis, must be disclosed in the organisation&#8217;s privacy notice, and must be subject to appropriate safeguards. An organisation that deployed Gemini across 500 users without updating its privacy notice has a compliance gap \u2014 and likely does not know it. There is also a data leakage risk: employees may use Gemini to process confidential customer data or financial information in unanticipated ways.<\/p>\n\n\n\n<p><strong>How to fix:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Before enabling Gemini broadly, define an AI usage policy \u2014 which features are permitted, for which user groups, and for which categories of data.<\/li>\n\n\n\n<li>Admin Console \u2192 Apps \u2192 Additional Google Services \u2192 Gemini for Google Workspace. Enable per Organisational Unit rather than domain-wide.<\/li>\n\n\n\n<li>For Enterprise plans, review Google&#8217;s Gemini data processing terms \u2014 specifically data residency and confirmation that your data is not used for model training.<\/li>\n\n\n\n<li>Update your organisation&#8217;s privacy notice to disclose AI-assisted processing via Google Workspace.<\/li>\n\n\n\n<li>Train employees on appropriate use \u2014 specifically, not inputting customer PII, financial data, or legally privileged content into Gemini prompts.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Cost and Operational Efficiency<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Mistake #9: Over-Licensing \u2014 Paying for the Wrong Tier<\/h3>\n\n\n\n<p><strong>Risk: <\/strong><em>Medium \u2014 Cost<\/em><\/p>\n\n\n\n<p>Licence tier selection in Indian enterprise deployments is often driven by the initial sales conversation rather than a structured needs assessment. Many organisations are on Business Plus or Enterprise plans when most users only need Business Standard \u2014 paying a 40\u201360% premium per user for capabilities that go unused.<\/p>\n\n\n\n<p>At Indian pricing (approximately \u20b9160\/user\/month for Starter, \u20b9870 for Standard, \u20b91,560 for Plus on annual plans, excluding GST), the cost difference between the wrong and right tier across 200 users over a year is significant. The reverse also happens: organisations on Standard that have genuine eDiscovery or compliance requirements, operating without Vault or advanced DLP.<\/p>\n\n\n\n<p><strong>How to fix:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Segment your user population by actual feature needs. Most knowledge workers need Standard; IT admins, legal, HR, and compliance roles may need Plus or Enterprise.<\/li>\n\n\n\n<li>Use mixed licensing where Google supports it \u2014 not all users need to be on the same plan.<\/li>\n\n\n\n<li>At renewal, run a licence usage audit: how many users have enabled Meet recording, Vault, or advanced DLP? Remove Plus licences from users who have never used Plus-specific features.<\/li>\n\n\n\n<li>Always use annual commitment pricing rather than monthly flexible billing \u2014 annual plans deliver 10\u201320% savings. On a 200-user Business Standard deployment, this alone saves \u20b92\u20134 lakhs per year.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Mistake #10: No Admin Alerts Configured \u2014 Operating Blind Until an Incident Happens<\/h3>\n\n\n\n<p><strong>Risk: <\/strong><em>Medium \u2014 Security<\/em><\/p>\n\n\n\n<p>Google Workspace&#8217;s Alert Centre surfaces critical security events: suspicious login activity, government-backed attack warnings, account takeover attempts, new Super Admin grants, data export events, and malware detections. In most Indian enterprise deployments, these alerts go to the Super Admin email address \u2014 which may be checked infrequently or flooded with other notifications.<\/p>\n\n\n\n<p>The result: security events that warrant immediate response are discovered days later, or only after the damage is done. Google itself notifies organisations of government-backed attack attempts targeting their users \u2014 an alert that is meaningless if no one reads it promptly.<\/p>\n\n\n\n<p><strong>How to fix:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Admin Console \u2192 Security \u2192 Alert Centre. Route all High severity alerts to an actively monitored distribution list \u2014 not a single admin mailbox.<\/li>\n\n\n\n<li>Enable email notifications for: Suspicious login activity, Government-backed attack warning, New Super Admin added, User granted admin privilege, and Phishing reported by user.<\/li>\n\n\n\n<li>Configure custom alerts in Reports \u2192 Audit for high-risk events: large Drive download volumes, external sharing with sensitive keywords, or admin login from new locations.<\/li>\n\n\n\n<li>If your organisation uses a SIEM tool, integrate Google Workspace audit logs via the Alerts API so events are correlated with broader security monitoring.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Quick Reference: All 10 Mistakes at a Glance<\/h2>\n\n\n\n<p><strong>#1 \u2014 Not enforcing 2SV: <\/strong>Enforce 2SV in Admin Console \u2192 Security \u2192 Authentication<\/p>\n\n\n\n<p><strong>#2 \u2014 Public Drive sharing: <\/strong>Disable &#8220;Anyone with link&#8221; domain-wide<\/p>\n\n\n\n<p><strong>#3 \u2014 Unrestricted OAuth apps: <\/strong>Switch OAuth to allowlist-only in API Controls<\/p>\n\n\n\n<p><strong>#4 \u2014 No offboarding process: <\/strong>Transfer Drive data at point of account suspension<\/p>\n\n\n\n<p><strong>#5 \u2014 Super Admin used daily: <\/strong>Create dedicated admin accounts, use delegated roles<\/p>\n\n\n\n<p><strong>#6 \u2014 Vault unconfigured: <\/strong>Define and apply retention rules by data type<\/p>\n\n\n\n<p><strong>#7 \u2014 No DPDP alignment: <\/strong>Accept Google&#8217;s Data Processing Amendment<\/p>\n\n\n\n<p><strong>#8 \u2014 Gemini without policy: <\/strong>Enable per OU, update privacy notice, train employees<\/p>\n\n\n\n<p><strong>#9 \u2014 Wrong licence tier: <\/strong>Segment users, audit unused features at renewal<\/p>\n\n\n\n<p><strong>#10 \u2014 No alert configuration: <\/strong>Route High severity alerts to monitored group inbox<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Where to Start<\/h2>\n\n\n\n<p>Not all ten mistakes carry equal urgency. If you are doing a first pass, prioritise in this order: enforce 2SV (#1), restrict Drive sharing defaults (#2), audit and restrict OAuth apps (#3), and implement an offboarding checklist (#4). These four address the most common initial access and data exposure vectors with relatively low implementation effort.<\/p>\n\n\n\n<p>The DPDP Act alignment (#7) and Gemini governance (#8) items are increasing in urgency \u2014 enforcement-readiness is expected by mid-2026, and the window for getting these controls in place before they become audit findings is narrowing.<\/p>\n\n\n\n<p>The cost and operational items (#9 and #10) often deliver quick wins that build internal credibility for the broader security programme. A licence rightsizing exercise that saves \u20b910\u201320 lakhs at renewal tends to generate executive appetite for the harder security investments that follow.<\/p>\n\n\n\n<p>The common thread across all ten mistakes is that they originate at deployment \u2014 in default settings and the absence of a structured configuration checklist. The best time to address them was at go-live. The second best time is now.<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Google Workspace is deployed. Users are onboarded. Licences are paid. And somewhere in the Admin Console, a set of default settings is quietly creating security exposure, compliance risk, or wasted&hellip;<\/p>\n","protected":false},"author":1,"featured_media":773,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[69],"tags":[],"class_list":["post-772","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-google-workspace"],"_links":{"self":[{"href":"https:\/\/cloudfirst.in\/insight\/wp-json\/wp\/v2\/posts\/772","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cloudfirst.in\/insight\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cloudfirst.in\/insight\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cloudfirst.in\/insight\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cloudfirst.in\/insight\/wp-json\/wp\/v2\/comments?post=772"}],"version-history":[{"count":1,"href":"https:\/\/cloudfirst.in\/insight\/wp-json\/wp\/v2\/posts\/772\/revisions"}],"predecessor-version":[{"id":774,"href":"https:\/\/cloudfirst.in\/insight\/wp-json\/wp\/v2\/posts\/772\/revisions\/774"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cloudfirst.in\/insight\/wp-json\/wp\/v2\/media\/773"}],"wp:attachment":[{"href":"https:\/\/cloudfirst.in\/insight\/wp-json\/wp\/v2\/media?parent=772"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cloudfirst.in\/insight\/wp-json\/wp\/v2\/categories?post=772"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cloudfirst.in\/insight\/wp-json\/wp\/v2\/tags?post=772"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}